General
-
Target
99544ecb7f197bf2a4fbe3f2bd915eab_JaffaCakes118
-
Size
30.7MB
-
Sample
240605-1mkjwsba59
-
MD5
99544ecb7f197bf2a4fbe3f2bd915eab
-
SHA1
7de1c5ae5daa86bbaf2064e53ae0dfcabb2b9217
-
SHA256
60815ff0818b32c789864d72bda2bb194514c79eaf12e211524820d6193ff1e7
-
SHA512
34861588253c829ea1a9dedda6d8042cc6f6280ffc9fe0a67cf89b55892fdd99a3627672a9011ed1493f3c5a80c69c385aa2f5b07feef96990611a16bf251dfb
-
SSDEEP
786432:Gj2VfjeY+czNv96gfRwMxLJxtCMkQixUOQ4KAR4HbLjzl0HO5:Ge/lxv+uJL5kQMUz4ZwLjzlKE
Static task
static1
Behavioral task
behavioral1
Sample
99544ecb7f197bf2a4fbe3f2bd915eab_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
99544ecb7f197bf2a4fbe3f2bd915eab_JaffaCakes118
-
Size
30.7MB
-
MD5
99544ecb7f197bf2a4fbe3f2bd915eab
-
SHA1
7de1c5ae5daa86bbaf2064e53ae0dfcabb2b9217
-
SHA256
60815ff0818b32c789864d72bda2bb194514c79eaf12e211524820d6193ff1e7
-
SHA512
34861588253c829ea1a9dedda6d8042cc6f6280ffc9fe0a67cf89b55892fdd99a3627672a9011ed1493f3c5a80c69c385aa2f5b07feef96990611a16bf251dfb
-
SSDEEP
786432:Gj2VfjeY+czNv96gfRwMxLJxtCMkQixUOQ4KAR4HbLjzl0HO5:Ge/lxv+uJL5kQMUz4ZwLjzlKE
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-